Blog Index (A–Z)

Clear all
10 posts (filtered) Tag: #cryptography
Cryptographically Secure Pseudo-Random Number Generator (CSPRNG)
Cryptographically Secure Pseudo-Random Number Generator (CSPRNG)

A CSPRNG is a type of algorithm that generates numbers that appear random but are actually produced by a deterministic process. Unlike regular pseudo-random number generators (PRNGs), which…

Read more →
Category: Security & Cryptography #security #cryptography #secure by design #CSPRNG #randomness #cryptographically #secure #pseudo-random #number #generator
Forward Secrecy in Computer Science: A Detailed Guide
Forward Secrecy in Computer Science: A Detailed Guide

Forward Secrecy (also called Perfect Forward Secrecy or PFS) is a cryptographic property that ensures the confidentiality of past communications even if the long-term private keys of a…

Read more →
Category: Security & Cryptography #security #cryptography #secure by design #forward secrecy #key exchange #tls #forward #secrecy #computer #science
Homomorphic Encryption: A Comprehensive Guide
Homomorphic Encryption: A Comprehensive Guide

Homomorphic Encryption (HE) is an advanced form of encryption that allows computations to be performed on encrypted data without ever decrypting it. The result of the computation, once…

Read more →
Category: Security & Cryptography #security #cryptography #secure by design #homomorphic encryption #privacy preserving computation #homomorphic #encryption
Online Certificate Status Protocol (OCSP): A Practical Guide for Developers
Online Certificate Status Protocol (OCSP): A Practical Guide for Developers

OCSP is an IETF standard that lets clients (browsers, apps, services) check whether an X.509 TLS certificate is valid, revoked, or unknown—in real time—without downloading large Certificate Revocation…

Read more →
Category: Security & Cryptography #security #cryptography #secure by design #TLS #transport layer security #https #encryption in transit #OCSP #certificate revocation #x.509
Recommendation for Random Number Generation Using Deterministic Random Bit Generators (DRBGs)
Recommendation for Random Number Generation Using Deterministic Random Bit Generators (DRBGs)

A Deterministic Random Bit Generator (DRBG) is an algorithm that generates a sequence of random-looking bits from a given initial value called a seed. Unlike true random number…

Read more →
Category: Security & Cryptography #security #cryptography #secure by design #DRBG #nist #random number generation #recommendation #random #number #generation
Secure Socket Layer (SSL): A Practical Guide for Modern Developers
Secure Socket Layer (SSL): A Practical Guide for Modern Developers

Secure Socket Layer (SSL) is a cryptographic protocol originally designed to secure communication over networks. Modern “SSL” in practice means TLS (Transport Layer Security)—the standardized, more secure successor…

Read more →
Category: Security & Cryptography #security #cryptography #secure by design #TLS #transport layer security #https #encryption in transit #SSL #certificates #secure
Understanding the Common Vulnerabilities and Exposures (CVE) System
Understanding the Common Vulnerabilities and Exposures (CVE) System

CVE (Common Vulnerabilities and Exposures) is an international system that provides a standardized method of identifying and referencing publicly known cybersecurity vulnerabilities. Each vulnerability is assigned a unique…

Read more →
Category: Security & Cryptography #security #cryptography #secure by design #cve #vulnerability database #abi #binary compatibility #interop #common #vulnerabilities
Understanding Transport Layer Security (TLS): A Complete Guide
Understanding Transport Layer Security (TLS): A Complete Guide

Transport Layer Security (TLS) is a cryptographic protocol that ensures secure communication between computers over a network. It is the successor to Secure Sockets Layer (SSL) and is…

Read more →
Category: Security & Cryptography #security #cryptography #secure by design #TLS #transport layer security #https #encryption in transit #SSL #certificates #transport
What is a Man-in-the-Middle (MITM) Attack?
What is a Man-in-the-Middle (MITM) Attack?

A Man-in-the-Middle (MITM) attack is when a third party secretly intercepts, reads, and possibly alters the communication between two parties who believe they are talking directly to each…

Read more →
Category: Security & Cryptography #security #cryptography #secure by design #man-in-the-middle #network security #tls #mitm #attack
What Is CAPTCHA? Understanding the Gatekeeper of the Web
What Is CAPTCHA? Understanding the Gatekeeper of the Web

CAPTCHA, short for Completely Automated Public Turing test to tell Computers and Humans Apart, is one of the most common tools used to protect websites from bots and…

Read more →
Category: Security & Cryptography #security #cryptography #secure by design #captcha #bot protection #web security #gatekeeper #web